[The] identification method used in information system (IS) networks whereby the sending host can verify an authorized user on its system is attempting a connection to another host. The sending host transmits the required user authentication information to the receiving host. [INFOSEC-99]